CSA Summit at (ISC)² Security Congress 2019
The Unspoken Risk Factors Of Your Underlying Cloud Infrastructure
This session will cover security vulnerabilities that are relevant to cloud computing, including crucial flaws in algorithmic implementations which could negatively impact industry standard data protection mechanisms. The prevalence of cloud specific vulnerabilities in cloud offerings that’s intrinsic in common cloud technology such as virtualization remains highly relevant. The difference between general security issues from cloud-specific issues isn’t clearly understood when “migrating to the cloud” therefore, there will be native contributing flaws in the design of an organization’s Cloud Security Strategy. General issues are commonly attributed to cloud computing issues thereby adding extra security vulnerabilities to the mix. The underlying cloud infrastructure should be a key consideration when defining an organizational Cloud Security Strategy.